🇷🇺

Void Rabisu

APT Group Financial gain Information theft and espionage 23 zero-day CVEs ETDA ✓

Also Known As 1 names

Tropical Scorpius

Target Countries 5

Countries highlighted in red

Canada Cameroon Japan Ukraine United States

Sectors Targeted

Details

Origin 🇷🇺 RU
Last Updated 21 Oct 2023

MITRE ATT&CK 73

T1003 - OS Credential Dumping T1005 - Data from Local System T1012 - Query Registry T1016 - System Network Configuration Discovery T1021.001 - Remote Desktop Protocol T1021.002 - SMB/Windows Admin Shares T1027 - Obfuscated Files or Information T1027.002 - Software Packing T1033 - System Owner/User Discovery T1036 - Masquerading T1047 - Windows Management Instrumentation T1053 - Scheduled Task/Job T1053.005 - Scheduled Task T1055 - Process Injection T1056 - Input Capture T1057 - Process Discovery T1059 - Command and Scripting Interpreter T1059.001 T1059.003 - Windows Command Shell T1059.007 - JavaScript T1068 - Exploitation for Privilege Escalation T1069 - Permission Groups Discovery T1070 - Indicator Removal on Host T1070.001 - Clear Windows Event Logs T1071 - Application Layer Protocol T1071.001 - Web Protocols T1074 - Data Staged T1078 - Valid Accounts T1080 T1082 - System Information Discovery T1083 - File and Directory Discovery T1102 - Web Service T1102.001 - Dead Drop Resolver T1102.002 - Bidirectional Communication T1105 - Ingress Tool Transfer T1105.001 T1106 - Native API T1112 - Modify Registry T1113 - Screen Capture T1132.001 - Standard Encoding T1135 - Network Share Discovery T1140 - Deobfuscate/Decode Files or Information T1189 - Drive-by Compromise T1190 - Exploit Public-Facing Application T1203 - Exploitation for Client Execution T1204 - User Execution T1204.002 - Malicious File T1210 - Exploitation of Remote Services T1218.011 - Rundll32 T1482 - Domain Trust Discovery T1486 - Data Encrypted for Impact T1490 - Inhibit System Recovery T1497 - Virtualization/Sandbox Evasion T1518 - Software Discovery T1543.003 - Windows Service T1547 - Boot or Logon Autostart Execution T1547.001 - Registry Run Keys / Startup Folder T1553 - Subvert Trust Controls T1560 - Archive Collected Data T1562.001 - Disable or Modify Tools T1564.004 - NTFS File Attributes T1566 - Phishing T1569 - System Services T1572 - Protocol Tunneling T1574 - Hijack Execution Flow T1574.001 - DLL Search Order Hijacking T1583.001 - Domains T1587.001 - Malware T1588.001 - Malware T1588.002 - Tool T1588.005 - Exploits T1588.006 - Vulnerabilities T1614 - System Location Discovery